default search action
BibTeX records: Shukor Abd Razak
@article{DBLP:journals/access/MaricanRSO23, author = {Mohamed Noordin Yusuff Marican and Shukor Abd Razak and Ali Selamat and Siti Hajar Othman}, title = {Cyber Security Maturity Assessment Framework for Technology Startups: {A} Systematic Literature Review}, journal = {{IEEE} Access}, volume = {11}, pages = {5442--5452}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2022.3229766}, doi = {10.1109/ACCESS.2022.3229766}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/MaricanRSO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GohariARSRG22, author = {Adel Gohari and Anuar Bin Ahmad and Ruzairi Bin Abdul Rahim and Abu Sahmah M. Supa'at and Shukor Abd Razak and Mohammed Salih Mohammed Gismalla}, title = {Involvement of Surveillance Drones in Smart Cities: {A} Systematic Review}, journal = {{IEEE} Access}, volume = {10}, pages = {56611--56628}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3177904}, doi = {10.1109/ACCESS.2022.3177904}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/GohariARSRG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ZakiARGA22, author = {Faiz Zaki and Firdaus Afifi and Shukor Abd Razak and Abdullah Gani and Nor Badrul Anuar}, title = {{GRAIN:} Granular multi-label encrypted traffic classification using classifier chain}, journal = {Comput. Networks}, volume = {213}, pages = {109084}, year = {2022}, url = {https://doi.org/10.1016/j.comnet.2022.109084}, doi = {10.1016/J.COMNET.2022.109084}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ZakiARGA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ZubairRNAYESA22, author = {Ajoze Abdulraheem Zubair and Shukor Abd Razak and Md. Asri Ngadi and Arafat Al{-}Dhaqm and Wael M. S. Yafooz and Abdel{-}Hamid M. Emara and Aldosary Saad and Hussain Al{-}Aqrabi}, title = {A Cloud Computing-Based Modified Symbiotic Organisms Search Algorithm {(AI)} for Optimal Task Scheduling}, journal = {Sensors}, volume = {22}, number = {4}, pages = {1674}, year = {2022}, url = {https://doi.org/10.3390/s22041674}, doi = {10.3390/S22041674}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/ZubairRNAYESA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ieaaie/HameedSLRK22, author = {Shilan S. Hameed and Ali Selamat and Liza Abdul Latiff and Shukor Abd Razak and Ondrej Krejcar}, editor = {Hamido Fujita and Philippe Fournier{-}Viger and Moonis Ali and Yinglin Wang}, title = {{WHTE:} Weighted Hoeffding Tree Ensemble for Network Attack Detection at Fog-IoMT}, booktitle = {Advances and Trends in Artificial Intelligence. Theory and Practices in Artificial Intelligence - 35th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, {IEA/AIE} 2022, Kitakyushu, Japan, July 19-22, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13343}, pages = {485--496}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-08530-7\_41}, doi = {10.1007/978-3-031-08530-7\_41}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ieaaie/HameedSLRK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/somet/HameedSLRK22, author = {Shilan S. Hameed and Ali Selamat and Liza Abdul Latiff and Shukor Abd Razak and Ondrej Krejcar}, editor = {Hamido Fujita and Yutaka Watanobe and Takuya Azumi}, title = {Multi-Classification of Imbalance Worm Ransomware in the IoMT System}, booktitle = {New Trends in Intelligent Software Methodologies, Tools and Techniques - Proceedings of the 21st International Conference on New Trends in Intelligent Software Methodologies, Tools and Techniques, SoMeT 2022, Kitakyushu, Japan, 20-22 September, 2022}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {355}, pages = {531--541}, publisher = {{IOS} Press}, year = {2022}, url = {https://doi.org/10.3233/FAIA220282}, doi = {10.3233/FAIA220282}, timestamp = {Mon, 30 Jan 2023 10:38:11 +0100}, biburl = {https://dblp.org/rec/conf/somet/HameedSLRK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aada/AlsoufiRSAANA21, author = {Muaadh A. Alsoufi and Shukor Abd Razak and Maheyzah Md Siraj and Bander Ali Saleh Al{-}rimy and Abdul{-}Rahman Al{-}Ali and Maged Nasser and Salah Abdo}, title = {A Review of Anomaly Intrusion Detection Systems in IoT using Deep Learning Techniques}, journal = {Adv. Data Sci. Adapt. Anal.}, volume = {13}, number = {3{\&}4}, pages = {2143001:1--2143001:21}, year = {2021}, url = {https://doi.org/10.1142/S2424922X21430014}, doi = {10.1142/S2424922X21430014}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aada/AlsoufiRSAANA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/Al-DhaqmIKRGCAA21, author = {Arafat Al{-}Dhaqm and Richard Adeyemi Ikuesan and Victor R. Kebande and Shukor Abd Razak and George Grispos and Kim{-}Kwang Raymond Choo and Bander Ali Saleh Al{-}Rimy and Abdul Rahman A. Alsewari}, title = {Digital Forensics Subdomains: The State of the Art and Future Directions}, journal = {{IEEE} Access}, volume = {9}, pages = {152476--152502}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3124262}, doi = {10.1109/ACCESS.2021.3124262}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/Al-DhaqmIKRGCAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cin/GhalebABSKRR21, author = {Fuad A. Ghaleb and Bander Ali Saleh Al{-}Rimy and Wadii Boulila and Faisal Saeed and Maznah Kamat and Mohd. Foad Rohani and Shukor Abd Razak}, title = {Fairness-Oriented Semichaotic Genetic Algorithm-Based Channel Assignment Technique for Node Starvation Problem in Wireless Mesh Networks}, journal = {Comput. Intell. Neurosci.}, volume = {2021}, pages = {2977954:1--2977954:19}, year = {2021}, url = {https://doi.org/10.1155/2021/2977954}, doi = {10.1155/2021/2977954}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cin/GhalebABSKRR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KhalafMMMMAREM21, author = {Bashar Ahmad Khalaf and Salama A. Mostafa and Aida Mustapha and Mazin Abed Mohammed and Moamin A. Mahmoud and Bander Ali Saleh Al{-}Rimy and Shukor Abd Razak and Mohamed Elhoseny and Adam Marks}, title = {An Adaptive Protection of Flooding Attacks Model for Complex Network Environments}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {5542919:1--5542919:17}, year = {2021}, url = {https://doi.org/10.1155/2021/5542919}, doi = {10.1155/2021/5542919}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KhalafMMMMAREM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/HameedSLRKFAO21, author = {Shilan S. Hameed and Ali Selamat and Liza Abdul Latiff and Shukor Abd Razak and Ondrej Krejcar and Hamido Fujita and Mohammad Nazir Ahmad and Sigeru Omatu}, title = {A Hybrid Lightweight System for Early Attack Detection in the IoMT Fog}, journal = {Sensors}, volume = {21}, number = {24}, pages = {8289}, year = {2021}, url = {https://doi.org/10.3390/s21248289}, doi = {10.3390/S21248289}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/HameedSLRKFAO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/RazakNA20, author = {Shukor Abd Razak and Nur Hafizah Mohd Nazari and Arafat Mohammed Rashad Al{-}Dhaqm}, title = {Data Anonymization Using Pseudonym System to Preserve Data Privacy}, journal = {{IEEE} Access}, volume = {8}, pages = {43256--43264}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2977117}, doi = {10.1109/ACCESS.2020.2977117}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/RazakNA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/Al-DhaqmROAGRM20, author = {Arafat Mohammed Rashad Al{-}Dhaqm and Shukor Abd Razak and Siti Hajar Othman and Abdul{-}Rahman Al{-}Ali and Fuad A. Ghaleb and Arief Salleh Rosman and Nurazmallail Marni}, title = {Database Forensic Investigation Process Models: {A} Review}, journal = {{IEEE} Access}, volume = {8}, pages = {48477--48490}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2976885}, doi = {10.1109/ACCESS.2020.2976885}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/Al-DhaqmROAGRM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/Al-DhaqmRDCSIAK20, author = {Arafat Mohammed Rashad Al{-}Dhaqm and Shukor Abd Razak and David A. Dampier and Kim{-}Kwang Raymond Choo and Kamran Siddique and Adeyemi Richard Ikuesan and Abdulhadi Alqarni and Victor R. Kebande}, title = {Categorization and Organization of Database Forensic Investigation Processes}, journal = {{IEEE} Access}, volume = {8}, pages = {112846--112858}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3000747}, doi = {10.1109/ACCESS.2020.3000747}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/Al-DhaqmRDCSIAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/Al-DhaqmRSIK20, author = {Arafat Mohammed Rashad Al{-}Dhaqm and Shukor Abd Razak and Kamran Siddique and Richard Adeyemi Ikuesan and Victor R. Kebande}, title = {Towards the Development of an Integrated Incident Response Model for Database Forensic Investigation Field}, journal = {{IEEE} Access}, volume = {8}, pages = {145018--145032}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3008696}, doi = {10.1109/ACCESS.2020.3008696}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/Al-DhaqmRSIK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/Al-DhaqmRIKS20, author = {Arafat Mohammed Rashad Al{-}Dhaqm and Shukor Abd Razak and Richard Adeyemi Ikuesan and Victor R. Kebande and Kamran Siddique}, title = {A Review of Mobile Forensic Investigation Process Models}, journal = {{IEEE} Access}, volume = {8}, pages = {173359--173375}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3014615}, doi = {10.1109/ACCESS.2020.3014615}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/Al-DhaqmRIKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/irict/AlsoufiRSANA20, author = {Muaadh A. Alsoufi and Shukor Abd Razak and Maheyzah Md Siraj and Abdulalem Ali and Maged Nasser and Salah Abdo}, editor = {Faisal Saeed and Fathey Mohammed and Abdulaziz Al{-}Nahari}, title = {Anomaly Intrusion Detection Systems in IoT Using Deep Learning Techniques: {A} Survey}, booktitle = {Innovative Systems for Intelligent Health Informatics - Data Science, Health Informatics, Intelligent Systems, Smart Computing, {IRICT} 2020, Langkawi, Malaysia, 21-22 December 2020}, series = {Lecture Notes on Data Engineering and Communications Technologies}, volume = {72}, pages = {659--675}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-70713-2\_60}, doi = {10.1007/978-3-030-70713-2\_60}, timestamp = {Sat, 06 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/irict/AlsoufiRSANA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-09655, author = {Fuad A. Ghaleb and Bander Ali Saleh Al{-}rimy and Maznah Kamat and Mohd. Foad Rohani and Shukor Abd Razak}, title = {Fairness-Oriented Semi-Chaotic Genetic Algorithm-Based Channel Assignment Technique for Nodes Starvation Problem in Wireless Mesh Network}, journal = {CoRR}, volume = {abs/2006.09655}, year = {2020}, url = {https://arxiv.org/abs/2006.09655}, eprinttype = {arXiv}, eprint = {2006.09655}, timestamp = {Tue, 23 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-09655.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mlc/AdeyemiRVS19, author = {Adeyemi Richard Ikuesan and Shukor Abd Razak and Hein S. Venter and Mazleena Salleh}, title = {Polychronicity tendency-based online behavioral signature}, journal = {Int. J. Mach. Learn. Cybern.}, volume = {10}, number = {8}, pages = {2103--2118}, year = {2019}, url = {https://doi.org/10.1007/s13042-017-0748-7}, doi = {10.1007/S13042-017-0748-7}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mlc/AdeyemiRVS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icufn/RashidR19, author = {Salman Rashid and Shukor Abd Razak}, title = {Big Data Challenges in 5G Networks}, booktitle = {Eleventh International Conference on Ubiquitous and Future Networks, {ICUFN} 2019, Zagreb, Croatia, July 2-5, 2019}, pages = {152--157}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICUFN.2019.8806076}, doi = {10.1109/ICUFN.2019.8806076}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icufn/RashidR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/irict/ZubairRNAM19, author = {Ajoze Abdulraheem Zubair and Shukor bin Abd Razak and Md. Asri Bin Ngadi and Ahmed Aliyu and Syed Hamid Hussain Madni}, editor = {Faisal Saeed and Fathey Mohammed and Nadhmi Gazem}, title = {Convergence-Based Task Scheduling Techniques in Cloud Computing: {A} Review}, booktitle = {Emerging Trends in Intelligent Computing and Informatics - Data Science, Intelligent Information Systems and Smart Computing, International Conference of Reliable Information and Communication Technology, {IRICT} 2019, Johor, Malaysia, 22-23 September, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {1073}, pages = {227--234}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-33582-3\_22}, doi = {10.1007/978-3-030-33582-3\_22}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/irict/ZubairRNAM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/irict/AbdallahRG19, author = {Abdallah Elhigazi Abdallah and Shukor Abd Razak and Fuad A. Ghaleb}, editor = {Faisal Saeed and Fathey Mohammed and Nadhmi Gazem}, title = {Deauthentication and Disassociation Detection and Mitigation Scheme Using Artificial Neural Network}, booktitle = {Emerging Trends in Intelligent Computing and Informatics - Data Science, Intelligent Information Systems and Smart Computing, International Conference of Reliable Information and Communication Technology, {IRICT} 2019, Johor, Malaysia, 22-23 September, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {1073}, pages = {857--866}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-33582-3\_81}, doi = {10.1007/978-3-030-33582-3\_81}, timestamp = {Sat, 09 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/irict/AbdallahRG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijaip/ChizariRMS18, author = {Hassan Chizari and Shukor Abd Razak and Mojib Majidi and Shaharuddin Salleh}, title = {Computer forensic problem of sample size in file type analysis}, journal = {Int. J. Adv. Intell. Paradigms}, volume = {11}, number = {1/2}, pages = {58--74}, year = {2018}, url = {https://doi.org/10.1504/IJAIP.2018.10013460}, doi = {10.1504/IJAIP.2018.10013460}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijaip/ChizariRMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/Al-DhaqmROCGAA17, author = {Arafat Mohammed Rashad Al{-}Dhaqm and Shukor Abd Razak and Siti Hajar Othman and Kim{-}Kwang Raymond Choo and William Bradley Glisson and Abdul{-}Rahman Al{-}Ali and Mohammad Al{-}Rousan}, title = {{CDBFIP:} Common Database Forensic Investigation Processes for Internet of Things}, journal = {{IEEE} Access}, volume = {5}, pages = {24401--24416}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2762693}, doi = {10.1109/ACCESS.2017.2762693}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/Al-DhaqmROCGAA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigcomp/AdeyemiRVS17, author = {Richard Adeyemi Ikuesan and Shukor Abd Razak and Hein S. Venter and Mazleena Salleh}, title = {High-level online user attribution model based on human Polychronic-Monochronic tendency}, booktitle = {2017 {IEEE} International Conference on Big Data and Smart Computing, BigComp 2017, Jeju Island, South Korea, February 13-16, 2017}, pages = {445--450}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/BIGCOMP.2017.7881753}, doi = {10.1109/BIGCOMP.2017.7881753}, timestamp = {Fri, 28 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigcomp/AdeyemiRVS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AdeyemiRS17, author = {Richard Adeyemi Ikuesan and Shukor Abd Razak and Mazleena Salleh}, title = {A Conceptual Model for Holistic Classification of Insider}, journal = {CoRR}, volume = {abs/1706.05402}, year = {2017}, url = {http://arxiv.org/abs/1706.05402}, eprinttype = {arXiv}, eprint = {1706.05402}, timestamp = {Fri, 28 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AdeyemiRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fiict/AdeyemiRS16, author = {Adeyemi R. Ikuesan and Shukor Abd Razak and Mazleena Salleh}, title = {Understanding Online Behavior: Exploring the Probability of Online Personality Trait Using Supervised Machine-Learning Approach}, journal = {Frontiers {ICT}}, volume = {3}, pages = {8}, year = {2016}, url = {https://doi.org/10.3389/fict.2016.00008}, doi = {10.3389/FICT.2016.00008}, timestamp = {Fri, 28 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fiict/AdeyemiRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/DezfouliRWRT15, author = {Behnam Dezfouli and Marjan Radi and Kamin Whitehouse and Shukor Abd Razak and Hwee Pink Tan}, title = {{DICSA:} Distributed and concurrent link scheduling algorithm for data gathering in wireless sensor networks}, journal = {Ad Hoc Networks}, volume = {25}, pages = {54--71}, year = {2015}, url = {https://doi.org/10.1016/j.adhoc.2014.09.011}, doi = {10.1016/J.ADHOC.2014.09.011}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/DezfouliRWRT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/RadiDBRL15, author = {Marjan Radi and Behnam Dezfouli and Kamalrulnizam Abu Bakar and Shukor Abd Razak and Malrey Lee}, title = {{LINKORD:} link ordering-based data gathering protocol for wireless sensor networks}, journal = {Computing}, volume = {97}, number = {3}, pages = {205--236}, year = {2015}, url = {https://doi.org/10.1007/s00607-014-0414-9}, doi = {10.1007/S00607-014-0414-9}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/RadiDBRL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/DezfouliRRTB15, author = {Behnam Dezfouli and Marjan Radi and Shukor Abd Razak and Hwee Pink Tan and Kamalrulnizam Abu Bakar}, title = {Modeling low-power wireless communications}, journal = {J. Netw. Comput. Appl.}, volume = {51}, pages = {102--126}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2014.02.009}, doi = {10.1016/J.JNCA.2014.02.009}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/DezfouliRRTB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/ChizariPRAS14, author = {Hassan Chizari and Timothy Poston and Shukor Abd Razak and Abdul Hanan Abdullah and Shaharuddin Salleh}, title = {Local coverage measurement algorithm in GPS-free wireless sensor networks}, journal = {Ad Hoc Networks}, volume = {23}, pages = {1--17}, year = {2014}, url = {https://doi.org/10.1016/j.adhoc.2014.05.015}, doi = {10.1016/J.ADHOC.2014.05.015}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/ChizariPRAS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/RadiDBRL14, author = {Marjan Radi and Behnam Dezfouli and Kamalrulnizam Abu Bakar and Shukor Abd Razak and Malrey Lee}, title = {Network Initialization in Low-Power Wireless Networks: {A} Comprehensive Study}, journal = {Comput. J.}, volume = {57}, number = {8}, pages = {1238--1261}, year = {2014}, url = {https://doi.org/10.1093/comjnl/bxt074}, doi = {10.1093/COMJNL/BXT074}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/RadiDBRL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/DezfouliRRWBT14, author = {Behnam Dezfouli and Marjan Radi and Shukor Abd Razak and Kamin Whitehouse and Kamalrulnizam Abu Bakar and Hwee{-}Pink Tan}, title = {Improving broadcast reliability for neighbor discovery, link estimation and collection tree construction in wireless sensor networks}, journal = {Comput. Networks}, volume = {62}, pages = {101--121}, year = {2014}, url = {https://doi.org/10.1016/j.comnet.2014.01.002}, doi = {10.1016/J.COMNET.2014.01.002}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/DezfouliRRWBT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/EissaRKS14, author = {Tameem Eissa and Shukor Abd Razak and Rashid Hafeez Khokhar and Normalia Samian}, title = {Erratum to: Trust-Based Routing Mechanism in {MANET:} Design and Implementation}, journal = {Mob. Networks Appl.}, volume = {19}, number = {5}, pages = {682}, year = {2014}, url = {https://doi.org/10.1007/s11036-013-0486-3}, doi = {10.1007/S11036-013-0486-3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/EissaRKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/RadiDBRT14, author = {Marjan Radi and Behnam Dezfouli and Kamalrulnizam Abu Bakar and Shukor Abd Razak and Hwee Pink Tan}, title = {{IM2PR:} interference-minimized multipath routing protocol for wireless sensor networks}, journal = {Wirel. Networks}, volume = {20}, number = {7}, pages = {1807--1823}, year = {2014}, url = {https://doi.org/10.1007/s11276-014-0710-5}, doi = {10.1007/S11276-014-0710-5}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/RadiDBRT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/GhoreishiRIC14, author = {Seyed{-}Mohsen Ghoreishi and Shukor Abd Razak and Ismail Fauzi Isnin and Hassan Chizari}, title = {Security evaluation over lightweight cryptographic protocols}, booktitle = {2014 International Symposium on Biometrics and Security Technologies, {ISBAST} 2014, Kuala Lumpur, Malaysia, August 26-27, 2014}, pages = {171--175}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISBAST.2014.7013116}, doi = {10.1109/ISBAST.2014.7013116}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/isbast/GhoreishiRIC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/GhoreishiRIC14a, author = {Seyed{-}Mohsen Ghoreishi and Shukor Abd Razak and Ismail Fauzi Isnin and Hassan Chizari}, title = {New secure identity-based and certificateless authenticated Key Agreement protocols without pairings}, booktitle = {2014 International Symposium on Biometrics and Security Technologies, {ISBAST} 2014, Kuala Lumpur, Malaysia, August 26-27, 2014}, pages = {188--192}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISBAST.2014.7013119}, doi = {10.1109/ISBAST.2014.7013119}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/GhoreishiRIC14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/AdeyemiRS14, author = {Adeyemi R. Ikuesan and Shukor Abd Razak and Mazleena Salleh}, title = {A psychographic framework for online user identification}, booktitle = {2014 International Symposium on Biometrics and Security Technologies, {ISBAST} 2014, Kuala Lumpur, Malaysia, August 26-27, 2014}, pages = {198--203}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISBAST.2014.7013121}, doi = {10.1109/ISBAST.2014.7013121}, timestamp = {Fri, 28 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/AdeyemiRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/SamsiR14, author = {Muhammad Syafiq bin Samsi and Shukor Abd Razak}, title = {A mechanism for privacy preserving in healthcare organizations}, booktitle = {2014 International Symposium on Biometrics and Security Technologies, {ISBAST} 2014, Kuala Lumpur, Malaysia, August 26-27, 2014}, pages = {208--213}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISBAST.2014.7013123}, doi = {10.1109/ISBAST.2014.7013123}, timestamp = {Fri, 17 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isbast/SamsiR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/GhoreishiRIC14b, author = {Seyed{-}Mohsen Ghoreishi and Shukor Abd Razak and Ismail Fauzi Isnin and Hassan Chizari}, title = {Rushing attack against routing protocols in Mobile Ad-Hoc Networks}, booktitle = {2014 International Symposium on Biometrics and Security Technologies, {ISBAST} 2014, Kuala Lumpur, Malaysia, August 26-27, 2014}, pages = {220--224}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISBAST.2014.7013125}, doi = {10.1109/ISBAST.2014.7013125}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/GhoreishiRIC14b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/Al-DhaqmORN14, author = {Arafat Mohammed Rashad Al{-}Dhaqm and Siti Hajar Othman and Shukor Abd Razak and Md. Asri Ngadi}, title = {Towards adapting metamodelling technique for database forensics investigation domain}, booktitle = {2014 International Symposium on Biometrics and Security Technologies, {ISBAST} 2014, Kuala Lumpur, Malaysia, August 26-27, 2014}, pages = {322--327}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISBAST.2014.7013142}, doi = {10.1109/ISBAST.2014.7013142}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/Al-DhaqmORN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/Razak14, author = {Shukor Abd Razak}, title = {Preface}, booktitle = {2014 International Symposium on Biometrics and Security Technologies, {ISBAST} 2014, Kuala Lumpur, Malaysia, August 26-27, 2014}, pages = {iii}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISBAST.2014.7013080}, doi = {10.1109/ISBAST.2014.7013080}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isbast/Razak14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/AnisiACR13, author = {Mohammad Hossein Anisi and Abdul Hanan Abdullah and Yahaya Coulibaly and Shukor Abd Razak}, title = {{EDR:} efficient data routing in wireless sensor networks}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {12}, number = {1}, pages = {46--55}, year = {2013}, url = {https://doi.org/10.1504/IJAHUC.2013.051390}, doi = {10.1504/IJAHUC.2013.051390}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/AnisiACR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/ZakiNKR13, author = {Salim M. Zaki and Md. Asri Ngadi and Maznah Kamat and Shukor Abd Razak}, title = {Quorum-based location service protocol for vehicular ad hoc networks in urban environment}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {14}, number = {1}, pages = {27--43}, year = {2013}, url = {https://doi.org/10.1504/IJAHUC.2013.056272}, doi = {10.1504/IJAHUC.2013.056272}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijahuc/ZakiNKR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/AdeyemiRA13, author = {Adeyemi R. Ikuesan and Shukor Abd Razak and Nor Amira Nor Azhan}, title = {A Review of Current Research in Network Forensic Analysis}, journal = {Int. J. Digit. Crime Forensics}, volume = {5}, number = {1}, pages = {1--26}, year = {2013}, url = {https://doi.org/10.4018/jdcf.2013010101}, doi = {10.4018/JDCF.2013010101}, timestamp = {Fri, 28 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdcf/AdeyemiRA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/EissaRKS13, author = {Tameem Eissa and Shukor Abd Razak and Rashid Hafeez Khokhar and Normalia Samian}, title = {Trust-Based Routing Mechanism in {MANET:} Design and Implementation}, journal = {Mob. Networks Appl.}, volume = {18}, number = {5}, pages = {666--677}, year = {2013}, url = {https://doi.org/10.1007/s11036-011-0328-0}, doi = {10.1007/S11036-011-0328-0}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/EissaRKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/AnisiAR13, author = {Mohammad Hossein Anisi and Abdul Hanan Abdullah and Shukor Abd Razak}, title = {Energy-efficient and reliable data delivery in wireless sensor networks}, journal = {Wirel. Networks}, volume = {19}, number = {4}, pages = {495--505}, year = {2013}, url = {https://doi.org/10.1007/s11276-012-0480-x}, doi = {10.1007/S11276-012-0480-X}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/AnisiAR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isda/SamsiR13, author = {Muhammad Syafiq bin Samsi and Shukor bin Abd Razak}, title = {A review of anonymous authentication mechanisms for health information management systems}, booktitle = {13th International Conference on Intellient Systems Design and Applications, {ISDA} 2013, Salangor, Malaysia, December 8-10, 2013}, pages = {341--346}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISDA.2013.6920761}, doi = {10.1109/ISDA.2013.6920761}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/isda/SamsiR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isda/RazakM13, author = {Shukor bin Abd Razak and Ahmad Fahrulrazie Bin Mohamad}, title = {Identification of spam email based on information from email header}, booktitle = {13th International Conference on Intellient Systems Design and Applications, {ISDA} 2013, Salangor, Malaysia, December 8-10, 2013}, pages = {347--353}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISDA.2013.6920762}, doi = {10.1109/ISDA.2013.6920762}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isda/RazakM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ahswn/EslaminejadRS12, author = {Mohammadreza Eslaminejad and Shukor Abd Razak and Mehdi Sookhak}, title = {Classification of Energy-Efficient Routing Protocols for Wireless Sensor Networks}, journal = {Ad Hoc Sens. Wirel. Networks}, volume = {17}, number = {1-2}, pages = {103--129}, year = {2012}, url = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-17-number-1-2-2013/ahswn-17-1-2-p-103-129/}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ahswn/EslaminejadRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/EslaminejadRI12, author = {Mohammadreza Eslaminejad and Shukor Abd Razak and Abdul Samad Haji Ismai}, title = {{EEDARS:} An Energy-Efficient Dual-Sink Algorithm with Role Switching Mechanism for Event-Driven Wireless Sensor Networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {6}, number = {10}, pages = {2473--2492}, year = {2012}, url = {https://doi.org/10.3837/tiis.2012.10.002}, doi = {10.3837/TIIS.2012.10.002}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/EslaminejadRI12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/AnisiARN12, author = {Mohammad Hossein Anisi and Abdul Hanan Abdullah and Shukor Abd Razak and Md. Asri Ngadi}, title = {Overview of Data Routing Approaches for Wireless Sensor Networks}, journal = {Sensors}, volume = {12}, number = {4}, pages = {3964--3996}, year = {2012}, url = {https://doi.org/10.3390/s120403964}, doi = {10.3390/S120403964}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/AnisiARN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/EslaminejadR12, author = {Mohammadreza Eslaminejad and Shukor Abd Razak}, title = {Fundamental Lifetime Mechanisms in Routing Protocols for Wireless Sensor Networks: {A} Survey and Open Issues}, journal = {Sensors}, volume = {12}, number = {10}, pages = {13508--13544}, year = {2012}, url = {https://doi.org/10.3390/s121013508}, doi = {10.3390/S121013508}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/EslaminejadR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/ChizariHSRA12, author = {Hassan Chizari and Majid Hosseini and Shaharuddin Salleh and Shukor Abd Razak and Abdul Hanan Abdullah}, title = {EF-MPR, a new energy eFficient multi-point relay selection algorithm for {MANET}}, journal = {J. Supercomput.}, volume = {59}, number = {2}, pages = {744--761}, year = {2012}, url = {https://doi.org/10.1007/s11227-010-0470-7}, doi = {10.1007/S11227-010-0470-7}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/ChizariHSRA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1210-1645, author = {Adeyemi R. Ikuesan and Shukor Abd Razak and Nor Amira Nor Azhan}, title = {Identifying critical features for network forensics investigation perspectives}, journal = {CoRR}, volume = {abs/1210.1645}, year = {2012}, url = {http://arxiv.org/abs/1210.1645}, eprinttype = {arXiv}, eprint = {1210.1645}, timestamp = {Fri, 28 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1210-1645.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ChizariHPRA11, author = {Hassan Chizari and Majid Hosseini and Timothy Poston and Shukor Abd Razak and Abdul Hanan Abdullah}, title = {Delaunay Triangulation as a New Coverage Measurement Method in Wireless Sensor Network}, journal = {Sensors}, volume = {11}, number = {3}, pages = {3163--3176}, year = {2011}, url = {https://doi.org/10.3390/s110303163}, doi = {10.3390/S110303163}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/ChizariHPRA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/EissaRN11, author = {Tameem Eissa and Shukor Abd Razak and Md. Asri Ngadi}, title = {Towards providing a new lightweight authentication and encryption scheme for {MANET}}, journal = {Wirel. Networks}, volume = {17}, number = {4}, pages = {833--842}, year = {2011}, url = {https://doi.org/10.1007/s11276-010-0318-3}, doi = {10.1007/S11276-010-0318-3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/EissaRN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wsn/AnisiAR11, author = {Mohammad Hossein Anisi and Abdul Hanan Abdullah and Shukor Abd Razak}, title = {Energy-Efficient Data Collection in Wireless Sensor Networks}, journal = {Wirel. Sens. Netw.}, volume = {3}, number = {10}, pages = {338--342}, year = {2011}, url = {https://doi.org/10.4236/wsn.2011.310037}, doi = {10.4236/WSN.2011.310037}, timestamp = {Wed, 25 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wsn/AnisiAR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/DezfouliRNR11, author = {Behnam Dezfouli and Marjan Radi and Mohammad Ali Nematbakhsh and Shukor Abd Razak}, title = {A Medium Access Control Protocol with Adaptive Parent Selection Mechanism for Large-Scale Sensor Networks}, booktitle = {25th {IEEE} International Conference on Advanced Information Networking and Applications Workshops, {WAINA} 2011, Biopolis, Singapore, March 22-25, 2011}, pages = {402--408}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/WAINA.2011.124}, doi = {10.1109/WAINA.2011.124}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/DezfouliRNR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwn/MohammedRHMA10, author = {Asma Ahmed Mohammed and Shukor Abd Razak and Abdul Hanan Abdullah and Izzeldin Mohammed and Yahia Abdella}, editor = {Hamid R. Arabnia and Victor A. Clincy and Leonidas Deligiannidis and Ashu M. G. Solo}, title = {A Review on Blackhole Attack in Mobile Ad Hoc Networks}, booktitle = {Proceedings of the 2010 International Conference on Wireless Networks, {ICWN} 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes}, pages = {116--121}, publisher = {{CSREA} Press}, year = {2010}, timestamp = {Thu, 10 Nov 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icwn/MohammedRHMA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1008-2855, author = {Behnam Dezfouli and Marjan Radi and Shukor Abd Razak}, title = {A Cross-Layer Approach for Minimizing Interference and Latency of Medium Access in Wireless Sensor Networks}, journal = {CoRR}, volume = {abs/1008.2855}, year = {2010}, url = {http://arxiv.org/abs/1008.2855}, eprinttype = {arXiv}, eprint = {1008.2855}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1008-2855.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/RazakFCB08, author = {Shukor Abd Razak and Steven Furnell and Nathan L. Clarke and Phillip J. Brooke}, title = {Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks}, journal = {Ad Hoc Networks}, volume = {6}, number = {7}, pages = {1151--1167}, year = {2008}, url = {https://doi.org/10.1016/j.adhoc.2007.11.004}, doi = {10.1016/J.ADHOC.2007.11.004}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/RazakFCB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/RazakSM08, author = {Shukor Abd Razak and Normalia Samian and Mohd Aizaini Maarof}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {A Friend Mechanism for Mobile Ad Hoc Networks}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {243--248}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.27}, doi = {10.1109/IAS.2008.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/RazakSM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiams/SamianMR08, author = {Normalia Samian and Mohd Aizaini Maarof and Shukor Abd Razak}, title = {Towards Identifying Features of Trust in Mobile Ad Hoc Network}, booktitle = {Second Asia International Conference on Modelling and Simulation, {AMS} 2008, Kuala Lumpur, Malaysia, May 13-15, 2008}, pages = {271--276}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/AMS.2008.113}, doi = {10.1109/AMS.2008.113}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiams/SamianMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adhoc-now/RazakFLB07, author = {Shukor Abd Razak and Steven Furnell and Nathan L. Clarke and Phillip J. Brooke}, editor = {Evangelos Kranakis and Jaroslav Opatrny}, title = {Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation}, booktitle = {Ad-Hoc, Mobile, and Wireless Networks, 6th International Conference, {ADHOC-NOW} 2007, Morelia, Mexico, September 24-26, 2007, Proceeedings}, series = {Lecture Notes in Computer Science}, volume = {4686}, pages = {129--141}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74823-6\_10}, doi = {10.1007/978-3-540-74823-6\_10}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/adhoc-now/RazakFLB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/RazakFCB06, author = {Shukor Abd Razak and Steven Furnell and Nathan L. Clarke and Phillip J. Brooke}, editor = {Sharad Mehrotra and Daniel Dajun Zeng and Hsinchun Chen and Bhavani Thuraisingham and Fei{-}Yue Wang}, title = {A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - {A} Friend Approach}, booktitle = {Intelligence and Security Informatics, {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3975}, pages = {590--595}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11760146\_62}, doi = {10.1007/11760146\_62}, timestamp = {Wed, 29 Jun 2022 15:37:43 +0200}, biburl = {https://dblp.org/rec/conf/isi/RazakFCB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eciw/RazakFB05, author = {Shukor Abd Razak and Steven Furnell and Phillip J. Brooke}, title = {A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks}, booktitle = {4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005}, pages = {271--280}, publisher = {Academic Conferences Limited, Reading, {UK}}, year = {2005}, timestamp = {Mon, 24 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eciw/RazakFB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.